Search Results for Computing Methodologies. - Narrowed by: Computer security.
SirsiDynix Enterprise
http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputing$002bMethodologies.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?dt=list
2026-04-04T08:01:57Z
Computing and Network Sustainability Proceedings of IRSCNS 2016
ent://SD_ILS/0/SD_ILS:481772
2026-04-04T08:01:57Z
2026-04-04T08:01:57Z
by Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format: Electronic Resources<br/>
Multimedia security technologies for digital rights management
ent://SD_ILS/0/SD_ILS:1186994
2026-04-04T08:01:57Z
2026-04-04T08:01:57Z
by Zeng, Wenjun, 1967-<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123694768">http://www.sciencedirect.com/science/book/9780123694768</a><br/>Format: Electronic Resources<br/>